beautypg.com

ZyXEL Communications P-334W User Manual

Page 14

background image

Prestige 334W User’s Guide

xiv

Table of Contents

16.4.1

Dynamic Secure Gateway Address.......................................................................................16-3

16.5

Summary Screen .....................................................................................................................16-3

16.6

Keep Alive................................................................................................................................16-5

16.7

NAT Traversal .........................................................................................................................16-6

16.7.1

NAT Traversal Configuration...............................................................................................16-6

16.7.2

Remote DNS Server..............................................................................................................16-7

16.8

ID Type and Content...............................................................................................................16-8

16.8.1

ID Type and Content Examples ............................................................................................16-9

16.9

Pre-Shared Key .....................................................................................................................16-10

16.10

Editing VPN Rules ................................................................................................................16-10

16.11

IKE Phases.............................................................................................................................16-15

16.11.1

Negotiation Mode ...........................................................................................................16-17

16.11.2

Diffie-Hellman (DH) Key Groups ..................................................................................16-17

16.11.3

Perfect Forward Secrecy (PFS).......................................................................................16-18

16.12

Configuring Advanced IKE Settings ...................................................................................16-18

16.13

Manual Key Setup ................................................................................................................16-25

16.13.1

Security Parameter Index (SPI).......................................................................................16-25

16.14

Configuring Manual Key .....................................................................................................16-26

16.15

Viewing SA Monitor..............................................................................................................16-30

16.16

Configuring Global Setting ..................................................................................................16-32

16.17

Telecommuter VPN/IPSec Examples...................................................................................16-33

16.17.1

Telecommuters Sharing One VPN Rule Example ..........................................................16-33

16.17.2

Telecommuters Using Unique VPN Rules Example ......................................................16-34

16.18

VPN and Remote Management ...........................................................................................16-36

Logs, Media Bandwidth Management and Maintenance...........................................................................VI

Chapter 17 Centralized Logs .....................................................................................................................17-1

17.1

View Log ..................................................................................................................................17-1

17.2

Log Settings .............................................................................................................................17-2

Chapter 18 Media Bandwidth Management ............................................................................................18-1

18.1

Bandwidth Management Overview.......................................................................................18-1

18.1.1

Application-based Bandwidth Management Example ..........................................................18-1

18.1.2

Subnet-based Bandwidth Management Example..................................................................18-2

18.1.3

Application and Subnet-based Bandwidth Management Example .......................................18-2

18.1.4

Bandwidth Usage Example...................................................................................................18-3

18.1.5

Bandwidth Management Priorities........................................................................................18-4

18.1.6

Bandwidth Management Services.........................................................................................18-5

18.1.7

Services.................................................................................................................................18-6

18.2

Configuration Screen..............................................................................................................18-8

18.3

Editing Bandwidth Management Rules .............................................................................. 18-11

18.3.1

Bandwidth Borrowing.........................................................................................................18-11

18.4

Configuring Bandwidth Management Rules and Services................................................ 18-11